Skip to main content
Various thinkers have dealt over the years with the influence of technology on how humans find their place in the world (Habermas 2003; Heidegger [1953] 2008; [1953] 1996). The technological developments of recent times have great... more
    • by 
    •   4  
      Critical TheoryWalter BenjaminCritical Information StudiesSelf Concept
As part of a continuum of Native, Indigenous, and Aboriginal resistance, digital projects and repositories offer platforms to reckon with settler representations of space and peoples. Two projects, Mapping Indigenous Los Angeles (MILA)... more
    • by 
    •   7  
      Indigenous StudiesDigital HumanitiesDigital MediaCritical Information Studies
The contemporary Critical Legal Research (“CLR”) project exhibits much diverse and vital thought. However, this Essay draws, in particular, on CLR strains in the explicit Marxist- and socialist-steeped traditions. Such a CLR framework... more
    • by 
    •   7  
      MarxismCritical Legal TheoryEcofeminismCritical Information Studies
Plagiarism is a folk devil into which is poured many of the challenges, problems and difficulties confronting higher education. This article investigates how software -Turnitin in particular-is 'solving' a particular 'crisis' in... more
    • by 
    •   14  
      Information TechnologyMedia StudiesMedia and Cultural StudiesInformation Literacy
From Ancient Times to the Present Day, writers have remarked on the unique power of music to evoke emotions, signal identity, and bond or divide entire societies, all without the benefit of literal representation. According to Aram... more
    • by 
    •   19  
      Critical TheoryMusicMusic HistoryMusicology
    • by 
    •   467  
      Information SystemsFinanceReligionBuddhism
Comment s’informait-on des affaires du temps aux XVIe et XVIIe siècles ? Ce livre explore les multiples dimensions de l’information en étudiant comment les données collectées sur le terrain des guerres ottomanes étaient transmises, reçues... more
    • by 
    •   20  
      Modern HistoryMedia StudiesOttoman HistoryItalian Studies
    • by 
    •   20  
      Cultural StudiesEconomicsCommunicationCensorship
Every two weeks, a language becomes extinct with its last speaker (Strochlic 2018). With the current attempt of preserving and revitalizing endangered languages, tech giants like Microsoft have been at the forefront to tackle this issue... more
    • by 
    •   6  
      Artificial IntelligenceIndigenous StudiesEndangered LanguagesCritical Information Studies
A temptative circumscription of 'the care of any archive' with reference to Stiegler's approach of technics as the pharmakon of 'the gap between the book and the book' (Derrida).  Paper proposal.
    • by 
    •   4  
      Archival StudiesLibrary ScienceBernard StieglerCritical Information Studies
The US Army Future Combat Systems is a large-scale procurement program that will introduce a number of ‘manned’ and ‘unmanned’ platforms all of which will be completely interconnected into one layered network. Hailed as revolutionary, all... more
    • by 
    •   2  
      Critical Information StudiesCritical Military Studies
The main goal of this paper is to conceptualize a seeping commodification . Author claims we are in the midst of a considerable qualitative transformation in the processes of commodification that is, in large part, owed to an overwhelming... more
    • by 
    •   7  
      Critical TheoryMarxismPolitical Economy of CommunicationCritical Media Studies
    • by 
    •   20  
      Critical TheoryMusicMusic HistoryMusicology
This book documents the first life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari’s challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
    • by 
    •   20  
      Critical TheoryMedia StudiesMedia and Cultural StudiesOrganizational Communication
This book documents the first life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari’s challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
    • by 
    •   20  
      Critical TheoryMedia StudiesMedia and Cultural StudiesOrganizational Communication
The paper proposes a critical approach to information systems definition, design, and development (ISD) grounded in discourse theory, semiotics, practical philosophy and critical systems thinking. It aims to support IS researchers and... more
    • by 
    •   21  
      Information SystemsInformation ScienceInformation TechnologyEpistemology
Aboutness ranks amongst our field's greatest bugbears. What is a work about? How can this be known? This mirrors debates within the philosophy of language, where the concept of representation has similarly evaded satisfactory definition.... more
    • by  and +1
    •   9  
      Philosophy Of LanguageKnowledge organizationCritical Studies in Library and Information ScienceCritical Information Studies
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS response messages may be substantially larger than DNS... more
    • by 
    •   3  
      Critical Information StudiesDenial of ServiceDDOS Attack
This paper argues that the current military program of transformation can be understood as both an institutional and a systemic adaptation to the increasing emphasis being placed upon the network form. Increasingly important to the... more
    • by 
    •   2  
      Critical Information StudiesCritical Military Studies
    • by 
    •   20  
      Cultural StudiesEconomicsCommunicationCensorship
One of the main objectives of this research paper is to map the security landscape of cloud computing systems and services running on Critical Infrastructures. In fulfilling this aim, first the cloud architecture will be laid out to... more
    • by 
    •   26  
      TerrorismAustraliaCloudsCritical Information Studies
A comparative review of Jonathan Sterne's MP3 and Matthew Fuller and Andrew Goffey's Evil Media.
    • by 
    •   3  
      Media StudiesSound studiesCritical Information Studies
We present in this paper the use of a security mechanism to handle the protection of network security components, such as Firewalls and Intrusion Detection Systems. Our approach consists of a kernel-based access control method which... more
    • by 
    •   11  
      Network SecurityAccess ControlCritical Information StudiesComputer Security
The CORAS method for security risk analysis provides a customized language, the CORAS diagrams, for threat and risk modelling. In this paper, we extend this language to capture context dependencies, and use it as a means to analyse mutual... more
    • by  and +1
    •   2  
      Critical Information StudiesRisk Analysis
    • by 
    •   18  
      Intellectual PropertyKnowledge ManagementInformation ManagementSociology of Knowledge
Book review of The Piracy Crusade
    • by  and +1
    •   24  
      Cultural StudiesMusicMusic HistoryEconomics
    • by 
    •   6  
      Research MethodologyCritical Studies in Library and Information ScienceLibrary and Information ScienceCritical Information Studies
Review of How We Became Our Data: A Genealogy of the Informational Person by Colin Koopman, Chicago, IL: University of Chicago Press, 2019, 272 pages, $30.00 paperback (ISBN: 9780226626581)
    • by 
    •   10  
      InformaticsArchivesCritical Information StudiesDigital Archives
This book documents the f irst life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari's challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
    • by 
    •   20  
      Critical TheoryMedia StudiesMedia and Cultural StudiesOrganizational Communication
We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet... more
    • by 
    •   7  
      Critical Information StudiesIntrusion Detection SystemCritical InfrastructureCritical State
We present in this paper the use of a security mechanism to handle the protection of network security components, such as Firewalls and Intrusion Detection Systems. Our approach consists of a kernel-based access control method which... more
    • by 
    •   11  
      Network SecurityAccess ControlCritical Information StudiesComputer Security
*La version française suit* *Please circulate widely*/*Excuse cross-posting* We are pleased to announce the Call for Proposals (CFP) for CAPAL15: Academic Librarianship and Critical Practice, the second annual conference of the... more
    • by 
    •   22  
      Information LiteracyCollection DevelopmentAcademic LibrarianshipAcademic Libraries
Inter-dependency evaluation through quantitative approaches is one of the open challenges in Critical Infrastructure Protection. The incapability to conduct appropriate networks inter-dependencies measurements undermines the possibility... more
    • by 
    • Critical Information Studies
This book documents the f irst life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari’s challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
    • by 
    •   20  
      Critical TheoryMedia StudiesMedia and Cultural StudiesOrganizational Communication
This book documents the first life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari’s challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
    • by 
    •   20  
      Critical TheoryMedia StudiesMedia and Cultural StudiesOrganizational Communication
This book documents the first life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari’s challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
    • by 
    •   20  
      Critical TheoryMedia StudiesMedia and Cultural StudiesOrganizational Communication
... Although many models have been developed to study particular contexts and single infrastruc-ture sectors, a global strategy to represent and manage the complex is-sue of infrastructure dependency has not been deployed yet. ... 2.1 A... more
    • by 
    •   3  
      Quality of lifeCritical Information StudiesCritical Infrastructure
The Collaborative for Historical Information and Analysis (CHIA), a large-scale digital humanities project, aims to link world-historical data in the social sciences, natural sciences, and humanities; allow researchers to draw new... more
    • by 
    •   20  
      HistoryGlobalizationDatabase SystemsMetadata
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS response messages may be substantially larger than DNS... more
    • by 
    •   3  
      Critical Information StudiesDenial of ServiceDDOS Attack
    • by 
    •   7  
      Information PolicyCritical Studies in Library and Information ScienceLibrary and Information ScienceCritical Information Studies
Google has become a central object of study for digital media scholars due to the power and impact wielded by the necessity to begin most engagements with social media via a search process, and the near-universality with which Google has... more
    • by 
    •   11  
      Critical TheoryFeminist TheoryDigital MediaRace and Racism